In this paper we implemented a graphical authentication system which overcomes all drawbacks of existing authentication system. In this system we combine the features of D´ej`a Vu, Cued Click Points, Secret Draw technique and Text Passwords. In this system we used database of 20 images. In the password creation process, we provide 4 images randomly amongst database of 20 images. On first 3 images user can select click points and add single digit/text on that images. On the fourth image user... Topics: Authentication, Graphical Passwords, Security
A facial composite is a graphical representation of an eyewitness memory of a face, as recorded by a composite artist. Facial composites are mainly used by police in their investigation of crimes. Construction of composite is originally performed by a trained artist, through drawing, sketching, and painting in consultation with a witness or crime victim. The information about the outlines of the facial features must be given to determine the characteristics of the features because the facial... Topics: Graphical Representation, Forensic Artists, Facial Composite
Keynote delivered by Victor Mieres, VP - Asia/RoW for National Instruments, during the 5th IEEE EAST-WEST DESIGN & TEST INTERNATIONAL SYMPOSIUM in Yerevan, Armenia, September 7-10, 2007. Author: http://www.ewdtest.com/conf/ Topic: graphical system design labview parallel programming multiprocessors
After realizing importance of Graphical passwords, In this paper we proposed a system which will overcome all drawbacks of existing systems & will play a great role in password authentication. In this paper we combine the features of D´ej`a Vu, Cued Click Points, Secret Draw technique and Text Passwords. In the password creation process, we provide 4 images. On first 3 images user will select click points and add single digit/text at the place of click point. On the fourth image user will... Topics: Authentication, Click Points, Graphical Password, Security
From the Festival Floppies collection. ClockMan is the Intelligent Alarm Clock for Windows 3.xx. Now you can set reminders for yourself to occur sometime in the future, AND you can schedule unattended operations complete with automatic keystrokes, all in one very powerful program! Topics: clockman, graphical, program, dynamics, alarm, limited, license, lan, file, user, graphical...
From the bitsavers.org collection, a scanned-in computer-related document. hp :: 64700 :: software general :: 64700-92013 GUI UG Correction Aug93 Topics: graphical, interface, user, aug, demo, notice, guide, description, operating, user interface,...
byMarkley, F. Landis; Andrews, Stephen F.; ODonnell, James R., Jr.; Ward, David K.; Ericsson, Aprille J
The Microwave Anisotropy Probe mission is designed to produce a map of the cosmic microwave background radiation over the entire celestial sphere by executing a fast spin and a slow precession of its spin axis about the Sun line to obtain a highly interconnected set of measurements. The spacecraft attitude is sensed and controlled using an Inertial Reference Unit, two Autonomous Star Trackers, a Digital Sun Sensor, twelve Coarse Sun Sensors, three Reaction Wheel Assemblies, and a propulsion... Topics: COMPUTATIONAL GRIDS, ARCHITECTURE (COMPUTERS), MANAGEMENT SYSTEMS, GRAPHICAL USER INTERFACE,...
Surface interface has made more effective impression in the processes and applications of interfacing technology. The human computer interface plays an important role in Surface computing. It provides a very sophisticated method for communication and interaction between user and system. The touchable devices used for tap, zooming, scrolling and other operations which have perform on touchable devices it may rise the symptoms of physical disability for next generation of people. The human organs... Topics: Surface Computing, Multitouch, GUI (Graphical User Interface), Radiation, ORI Techniques
In this paper, we are propose a new approach for combining item-based collaborative filtering with case based reasoning to pursue personalized information filtering in a knowledge sharing context. Functionally, our personalized information filtering approach allows the use of recommendations by peers with similar interests and domain experts to guide the selection of information deemed relevant to an active user's profile. We are developing Collaborative Environments: Fine-Grained Knowledge... Topics: Advisor Search, Text Mining, Dirichlet Processes, Graphical Models
The present paper consists of a didactic model and methodology of teaching for the organization and carrying out of specialized training in Informatics on high school level in secondary schools teaching the module âEvent-driven programming in graphical user interface environment (IDE)â. Step-by-step methodological tools for teaching the Informatics curriculum have been developed considering the module. Topics: event-driven programming, graphical user interface, Informatics, teaching methodology
This course teaches the basics of designing a dynamic web site with a database back end, including scripting languages, cookies, SQL, and HTML with the goal of building such a site as the main (group) project Emphasizes computer-human interface and the graphical display of information. Crucial to the project is the identification of a client with whom the group must work with throughout the month, designing specifications, implementing them, reviewing and evaluating, and testing. This is a... favoritefavoritefavorite ( 3 reviews ) Topics: dynamic web site design, web design, graphical interfaces
The Xerox 6085 (Daybreak) Professional Computer System workstation introduced in a two part video. Thanks Ed Weeden for the digitization. Topics: Digibarn, Xerox workstations, graphical user interfaces, computing history, 1980s
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed one such system, called Secure Authentication using Click Draw Based graphical password scheme, and evaluated it with human users. Secure Authentication using Click Draw Based graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for... Topics: Click Draw, Cued Click Point, Graphical password, HOTSPOTS, Textual password.
System requirements for accompanying computer disc: Microsoft Windows 2000 or windows NT (Service Pack 6a) Topics: ArcGIS, Geographic information systems, Graphical user interfaces (Computer systems), Matemática
Find the smallest value of a constant m such that 0 < mx â 1 + (1/x) for all positive values of x. This manuscript was written in 1980, but remained lost in the authorâs library until recently rediscovered. Topics: minima of a function, graphical analysis, discriminant, calculus
In rare disease physician targeting, a major challenge is how to identify physicians who are treating diagnosed or underdiagnosed rare diseases patients. Rare diseases have extremely low incidence rate. For a specified rare disease, only a small number of patients are affected and a fractional of physicians are involved. The existing targeting methodologies, such as segmentation and profiling, are developed under mass market assumption. They are not suitable for rare disease market where the... Topics: factor graph, probabilistic graphical model, pharmaceutical, rare disease, targeting